OneUTSystem - Question Answered by Paul

Q: Could we have a place with a salad bar/potato bar/bar in the building?

Picture of an example of the type of food options which might be available in the new building
New Building Food Option

 

 

 

 

 

 

 

 

Tis the Season for Cyber Crime

Phishing campaigns that try to dupe consumers into giving away personal and financial information tend to rise during the holiday season, use the following tips to prevent falling victim to cyber criminals.

If an offer looks too good to be true, it probably is.

A common tactic by cyber criminals is using extremely low prices on popular items, such as electronics, to lure in potential victims.

Use a credit card instead of a debit card.

Top 10 Myths About Identity Theft

Each new data breach and phishing scam alert is accompanied by a wave of cyber security articles and commentary. The tone of these stories can range from panicked to apathetic. But the facts can't be ignored: identity theft is an epidemic in the United States. According to TransUnion, 19 people fall victim to identity theft every minute.

Workforce Planning FAQ

On September 2, 2016, the Chancellor shared with System Administration that the Board of Regents approved the FY 2017 UT System operating budget with instructions to reduce the number of full-time equivalent (FTE) employees by at least 130 positions.  In the same communication, System Administration was invited to submit questions regarding the process to OESQuestions@utsystem.edu .  Questions have been submitted and the website created.  The website will continue to be updated as additional questions are submitted and answers ar

Using the Cloud Securely

“The Cloud” can mean different things to different people, but usually means using a service provider on the Internet to store and manage your computing systems and/or data for you. An advantage of the Cloud is that you can easily access and synchronize your data from multiple devices anywhere in the world, and you can also share your information with anyone you want. We call these services “The Cloud” because you often do not know where your data is physically stored.

OneUTSystem - Bike Lockers

If you haven’t been following this topic in Idea Central, we had a request for bike lockers in the new building.  Bike lockers look like this:

Four Steps to Staying Safe Online

As technology gains a more important role in our lives, it also grows in complexity. Given how quickly technology changes, keeping up with security advice can be confusing. It seems like there is always new guidance on what you should or should not be doing. However, while the details of how to stay secure may change over time, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using, or where you are using it, we recommend the following four key steps:

New Process: Making Requests for Data or Information from the Campuses

During the data collection phase of the organizational assessment, we learned requests for data and information to UT System institutions from UT System Administration are a significant burden.  Reducing and streamlining those requests would be an important action to take.

Creating a Culture of Cybersecurity in the Workplace

Welcome to Week 2 National Cyber Security Awareness Month! The second of our weekly cyber security topics is “Creating a Culture of Cybersecurity in the Workplace.”

The Internet has become an indispensable tool assisting in so many ways, from reaching new customers to enabling the mobile workforce to do its job. But being constantly connected increases the risk of online theft, fraud and abuse.

Mandatory Training

The Texas Legislature has mandated all new state employees receive training on sexual harassment and equal employment opportunity during the initial 30 days of employment and supplemental training every two years thereafter.  In addition, the Texas Administrative Code 202 requires periodic training on the secure use of information resources.  To adhere to these mandates, a Bi-Annual Compliance Training module will be placed on the Learning Zone on October 3, 2016.